Cisco case studies

All content by Cisco

Mobility has brought down the wall between business and personal, spiking corporate productivity and putting work/life balance within reach, but making security an issue. This paper explains how you can have threat protection which gives you the power to stop threats everywhere.
VIEW SUMMARY

Organisations spend millions of dollars annually on contact centre technology to help improve customer satisfaction, become more competitive, and reduce the cost of acquiring and retaining loyal customers. But is the investment really worth the money? Read to find out more.
VIEW SUMMARY

Research shows that companies using video throughout their organisation accrue benefits at a much higher rate than they do for less-pervasive users. However, these business benefits are best maximised when everyone who needs to be is regularly up and running on video collaboration, find out how.
VIEW SUMMARY

The ability to collaborate across functional boundaries, time zones or even organisational borders is becoming an ever more critical determinant of success. This report discusses the degrees to which leading companies are obtaining business value through leading edge, cloud-driven collaboration.
VIEW SUMMARY

Trends such as BYOD and social media have had profound effects on organisations. However, next-generation firewalls that only provide application and user ID awareness fall short of providing the level of network visibility required to safely enable them. Read to find out more.
VIEW SUMMARY

The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
VIEW SUMMARY

Today’s threat landscape is nothing like that of just 10 years ago. Traditional defences that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum. Read to find out more.
VIEW SUMMARY

To protect against sophisticated threats and an ever-expanding connected environment, organisations need to move beyond classic, static security technologies. This paper explains how there is a need for a new threat-centric security model that addresses the full attack continuum.
VIEW SUMMARY

With the “Internet of Things” (IoT) upon us, numerous industries are using IoT technology. Read to find out how IoT will introduce unprecedented growth in devices and data, and how to deal with this. More importantly, IoT introduces new cybersecurity concerns and therefore, CISOs need an IoT plan.
VIEW SUMMARY

Network security defences are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks. This white paper discusses how bad have things gotten and what should CISOs do to address these issues.
VIEW SUMMARY